Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The main objective of this research is to design a model that extends digital forensics to the information systems audit process in order to ensure

The main objective of this research is to design a model that extends digital forensics to the information systems audit process in order to ensure confidentiality, integrity, and availability (CIA) of information and ensure compliance with IT activities relevant to Company policies, industry best practices, and government laws and regulations, as well as to validate evidence collected by Information Systems Auditors.

The following are the sub-objectives:

1. Analyze the current designs in the information system audit process to ensure the CIA of Information System and validity of evidence collected.

2. To evaluate the IS Audit process phases and determine which IS Audit process phases will require the integration of digital forensics into Information System Audit.

3. Design a model that integrates digital forensics into IS Audit to ensure the confidentiality, integrity, and availability of information systems, as well as the validity of the evidence collected.

4. Evaluate the proposed digital forensics-infused Information Systems Audit process model.

RESEARCH QUESTIONS

The below questions will be answered:

1. What are the current designs in the information system audit process to ensure CIA of Information System, and validity of evidence collected?

2. What are the phases of the IS Audit process, and which of these phases would require the integration of digital forensic techniques to improve the effectiveness of the Information System Audit?

3. What are the model components and how they can work together to ensure the confidentiality, integrity, and availability of information systems, as well as the validity of the evidence collected?

4. Does the proposed model ensure the CIA of information and the validity of the evidence collected?

Step by Step Solution

3.48 Rating (155 Votes )

There are 3 Steps involved in it

Step: 1

Analysis of the current designs in the information system audit process to ensure the CIA of Information System and validity of evidence collected The current designs in the information system audit p... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing and Assurance Services A Systematic Approach

Authors: William Messier, Steven Glover, Douglas Prawitt

9th edition

1308361491, 77862333, 978-1259248290, 9780077862336, 1259162346, 978-1259162343

More Books

Students also viewed these Programming questions